Cryptographic Algorithms on Reconfigurable Hardware

Part of the series Signals and Communication Technology pp 189-220

Reconfigurable Hardware Implementation of Hash Functions

* Final gross prices may vary according to local VAT.

Get Access


This Chapter has two main purposes. The first purpose is to introduce readers to how hash functions work. The second purpose is to study key aspects of hardware implementations of hash functions. To achieve those goals, we selected MD5 as the most studied and widely used hash algorithm. A step-by-step description of MD5 has been provided which we hope will be useful for understanding the mathematical and logical operations involved in it. The study and analysis of MD5 will be utilized as a base for explaining the most recent SHA2 family of hash algorithms.